Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.882737
Categoría:CentOS Local Security Checks
Título:CentOS Update for glibc CESA-2017:1480 centos6
Resumen:Check the version of glibc
Descripción:Summary:
Check the version of glibc

Vulnerability Insight:
The glibc packages provide the standard C
libraries (libc), POSIX thread libraries (libpthread), standard math libraries
(libm), and the name service cache daemon (nscd) used by multiple programs on
the system. Without these libraries, the Linux system cannot function correctly.

Security Fix(es):

* A flaw was found in the way memory was being allocated on the stack for
user space binaries. If heap (or different memory region) and stack memory
regions were adjacent to each other, an attacker could use this flaw to
jump over the stack guard gap, cause controlled memory corruption on
process stack or the adjacent memory region, and thus increase their
privileges on the system. This is glibc-side mitigation which blocks
processing of LD_LIBRARY_PATH for programs running in secure-execution mode
and reduces the number of allocations performed by the processing of
LD_AUDIT, LD_PRELOAD, and LD_HWCAP_MASK, making successful exploitation of
this issue more difficult. (CVE-2017-1000366)

Red Hat would like to thank Qualys Research Labs for reporting this issue.

Affected Software/OS:
glibc on CentOS 6

Solution:
Please Install the Updated Packages.

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2017-1000366
BugTraq ID: 99127
http://www.securityfocus.com/bid/99127
Bugtraq: 20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X (Google Search)
https://seclists.org/bugtraq/2019/Sep/7
Debian Security Information: DSA-3887 (Google Search)
http://www.debian.org/security/2017/dsa-3887
https://www.exploit-db.com/exploits/42274/
https://www.exploit-db.com/exploits/42275/
https://www.exploit-db.com/exploits/42276/
http://seclists.org/fulldisclosure/2019/Sep/7
https://security.gentoo.org/glsa/201706-19
http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
RedHat Security Advisories: RHSA-2017:1479
https://access.redhat.com/errata/RHSA-2017:1479
RedHat Security Advisories: RHSA-2017:1480
https://access.redhat.com/errata/RHSA-2017:1480
RedHat Security Advisories: RHSA-2017:1481
https://access.redhat.com/errata/RHSA-2017:1481
RedHat Security Advisories: RHSA-2017:1567
https://access.redhat.com/errata/RHSA-2017:1567
RedHat Security Advisories: RHSA-2017:1712
https://access.redhat.com/errata/RHSA-2017:1712
http://www.securitytracker.com/id/1038712
CopyrightCopyright (C) 2017 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.